2020
DOI: 10.14569/ijacsa.2020.0110959
|View full text |Cite
|
Sign up to set email alerts
|

Computational Analysis of Arabic Cursive Steganography using Complex Edge Detection Techniques

Abstract: Arabic language contains a multiple set of features which complete the process of embedding and extracting text from the compressed image. In specific, the Arabic language covers numerous textual styles and shapes of the Arabic letter. This paper investigated Arabic cursive steganography using complex edge detection techniques via compressed image, which comprises several characteristics (short, medium and Long sentence) as per the research interest. Sample of images from the Berkeley Segmentation Database (BS… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 11 publications
0
1
0
Order By: Relevance
“…Data hiding and encryption are two basic approaches that play essential roles in information security. In addition, data encryption is a type of cryptography that converts a confidential message into a scribbled enciphered form before sending it via a private or public channel [3]. As a result, following encryption, the carrier object has no value.…”
Section: Introductionmentioning
confidence: 99%
“…Data hiding and encryption are two basic approaches that play essential roles in information security. In addition, data encryption is a type of cryptography that converts a confidential message into a scribbled enciphered form before sending it via a private or public channel [3]. As a result, following encryption, the carrier object has no value.…”
Section: Introductionmentioning
confidence: 99%
“…Although they have the same goal, steganography and cryptography use different techniques. Steganography, as compared to cryptography, keeps the original data by concealing it in various medium [2] [3].…”
Section: Introductionmentioning
confidence: 99%